lxc_controller.c 72.3 KB
Newer Older
1
/*
2
 * Copyright (C) 2010-2014 Red Hat, Inc.
3
 * Copyright IBM Corp. 2008
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
 *
 * lxc_controller.c: linux container process controller
 *
 * Authors:
 *  David L. Leskovec <dlesko at linux.vnet.ibm.com>
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
21
 * License along with this library.  If not, see
O
Osier Yang 已提交
22
 * <http://www.gnu.org/licenses/>.
23 24 25 26 27
 */

#include <config.h>

#include <sys/epoll.h>
28 29
#include <sys/wait.h>
#include <sys/socket.h>
30 31
#include <sys/types.h>
#include <sys/un.h>
32
#include <sys/personality.h>
33
#include <unistd.h>
34
#include <paths.h>
35
#include <errno.h>
36 37
#include <fcntl.h>
#include <signal.h>
38
#include <getopt.h>
39
#include <sys/mount.h>
E
Eric Blake 已提交
40
#include <locale.h>
41 42
#include <grp.h>
#include <sys/stat.h>
43
#include <time.h>
44

45
#if WITH_CAPNG
46
# include <cap-ng.h>
D
Daniel P. Berrange 已提交
47 48
#endif

49
#include "virerror.h"
50
#include "virlog.h"
51 52

#include "lxc_conf.h"
53
#include "lxc_container.h"
54
#include "lxc_cgroup.h"
55
#include "lxc_monitor_protocol.h"
G
Gao feng 已提交
56
#include "lxc_fuse.h"
57 58
#include "virnetdev.h"
#include "virnetdevveth.h"
59
#include "viralloc.h"
E
Eric Blake 已提交
60
#include "virfile.h"
61
#include "virpidfile.h"
62
#include "vircommand.h"
63
#include "nodeinfo.h"
64
#include "virrandom.h"
65
#include "virprocess.h"
66
#include "virnuma.h"
67
#include "virdbus.h"
68
#include "rpc/virnetserver.h"
69
#include "virstring.h"
70

71 72
#define VIR_FROM_THIS VIR_FROM_LXC

73 74
VIR_LOG_INIT("lxc.lxc_controller");

75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
typedef struct _virLXCControllerConsole virLXCControllerConsole;
typedef virLXCControllerConsole *virLXCControllerConsolePtr;
struct _virLXCControllerConsole {
    int hostWatch;
    int hostFd;  /* PTY FD in the host OS */
    bool hostClosed;
    int hostEpoll;

    int contWatch;
    int contFd;  /* PTY FD in the container */
    bool contClosed;
    int contEpoll;

    int epollWatch;
    int epollFd; /* epoll FD for dealing with EOF */

    size_t fromHostLen;
    char fromHostBuf[1024];
    size_t fromContLen;
    char fromContBuf[1024];
95 96

    virNetServerPtr server;
97 98
};

99 100 101 102
typedef struct _virLXCController virLXCController;
typedef virLXCController *virLXCControllerPtr;
struct _virLXCController {
    char *name;
103
    virDomainObjPtr vm;
104
    virDomainDefPtr def;
105

106 107
    int handshakeFd;

108 109
    pid_t initpid;

110 111
    size_t nveths;
    char **veths;
112

113 114 115
    size_t npassFDs;
    int *passFDs;

116 117
    size_t nconsoles;
    virLXCControllerConsolePtr consoles;
118
    char *devptmx;
119 120 121

    size_t nloopDevs;
    int *loopDevFds;
122 123

    virSecurityManagerPtr securityManager;
124

125 126
    /* Server socket */
    virNetServerPtr server;
127
    bool firstClient;
128 129 130 131
    virNetServerClientPtr client;
    virNetServerProgramPtr prog;
    bool inShutdown;
    int timerShutdown;
G
Gao feng 已提交
132

133 134
    virCgroupPtr cgroup;

G
Gao feng 已提交
135
    virLXCFusePtr fuse;
136 137
};

138 139
#include "lxc_controller_dispatch.h"

140
static void virLXCControllerFree(virLXCControllerPtr ctrl);
141 142
static int virLXCControllerEventSendInit(virLXCControllerPtr ctrl,
                                         pid_t initpid);
143

144 145 146 147 148 149 150 151 152
static void virLXCControllerQuitTimer(int timer ATTRIBUTE_UNUSED, void *opaque)
{
    virLXCControllerPtr ctrl = opaque;

    VIR_DEBUG("Triggering event loop quit");
    virNetServerQuit(ctrl->server);
}


153 154 155 156
static virLXCControllerPtr virLXCControllerNew(const char *name)
{
    virLXCControllerPtr ctrl = NULL;
    virCapsPtr caps = NULL;
157
    virDomainXMLOptionPtr xmlopt = NULL;
158 159
    char *configFile = NULL;

160
    if (VIR_ALLOC(ctrl) < 0)
161
        goto error;
162

163
    ctrl->timerShutdown = -1;
164
    ctrl->firstClient = true;
165

166 167
    if (VIR_STRDUP(ctrl->name, name) < 0)
        goto error;
168

169
    if (!(caps = virLXCDriverCapsInit(NULL)))
170 171
        goto error;

172
    if (!(xmlopt = lxcDomainXMLConfInit()))
173 174
        goto error;

175 176 177 178
    if ((configFile = virDomainConfigFile(LXC_STATE_DIR,
                                          ctrl->name)) == NULL)
        goto error;

179 180 181 182
    if ((ctrl->vm = virDomainObjParseFile(configFile,
                                          caps, xmlopt,
                                          1 << VIR_DOMAIN_VIRT_LXC,
                                          0)) == NULL)
183
        goto error;
184
    ctrl->def = ctrl->vm->def;
185

186 187 188 189 190
    if ((ctrl->timerShutdown = virEventAddTimeout(-1,
                                                  virLXCControllerQuitTimer, ctrl,
                                                  NULL)) < 0)
        goto error;

191
 cleanup:
192
    VIR_FREE(configFile);
193
    virObjectUnref(caps);
194
    virObjectUnref(xmlopt);
195 196
    return ctrl;

197
 error:
198 199 200 201 202
    virLXCControllerFree(ctrl);
    ctrl = NULL;
    goto cleanup;
}

203

204
static int virLXCControllerCloseLoopDevices(virLXCControllerPtr ctrl)
205 206 207
{
    size_t i;

208
    for (i = 0; i < ctrl->nloopDevs; i++)
209
        VIR_FORCE_CLOSE(ctrl->loopDevFds[i]);
210 211 212 213 214

    return 0;
}


215 216 217 218 219
static void virLXCControllerStopInit(virLXCControllerPtr ctrl)
{
    if (ctrl->initpid == 0)
        return;

220
    virLXCControllerCloseLoopDevices(ctrl);
221
    virProcessAbort(ctrl->initpid);
222 223 224 225
    ctrl->initpid = 0;
}


226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241
static void virLXCControllerConsoleClose(virLXCControllerConsolePtr console)
{
    if (console->hostWatch != -1)
        virEventRemoveHandle(console->hostWatch);
    VIR_FORCE_CLOSE(console->hostFd);

    if (console->contWatch != -1)
        virEventRemoveHandle(console->contWatch);
    VIR_FORCE_CLOSE(console->contFd);

    if (console->epollWatch != -1)
        virEventRemoveHandle(console->epollWatch);
    VIR_FORCE_CLOSE(console->epollFd);
}


G
Gao feng 已提交
242 243 244 245 246 247 248
static void
virLXCControllerFreeFuse(virLXCControllerPtr ctrl)
{
    return lxcFreeFuse(&ctrl->fuse);
}


249 250
static void virLXCControllerFree(virLXCControllerPtr ctrl)
{
251 252
    size_t i;

253 254 255
    if (!ctrl)
        return;

256 257
    virLXCControllerStopInit(ctrl);

258
    virObjectUnref(ctrl->securityManager);
259

260
    for (i = 0; i < ctrl->nveths; i++)
261 262 263
        VIR_FREE(ctrl->veths[i]);
    VIR_FREE(ctrl->veths);

264 265 266 267
    for (i = 0; i < ctrl->npassFDs; i++)
        VIR_FORCE_CLOSE(ctrl->passFDs[i]);
    VIR_FREE(ctrl->passFDs);

268
    for (i = 0; i < ctrl->nconsoles; i++)
269 270 271
        virLXCControllerConsoleClose(&(ctrl->consoles[i]));
    VIR_FREE(ctrl->consoles);

272 273
    VIR_FREE(ctrl->devptmx);

274
    virObjectUnref(ctrl->vm);
275 276
    VIR_FREE(ctrl->name);

277 278 279
    if (ctrl->timerShutdown != -1)
        virEventRemoveTimeout(ctrl->timerShutdown);

280
    virObjectUnref(ctrl->server);
G
Gao feng 已提交
281
    virLXCControllerFreeFuse(ctrl);
282

283 284
    virCgroupFree(&ctrl->cgroup);

285 286
    /* This must always be the last thing to be closed */
    VIR_FORCE_CLOSE(ctrl->handshakeFd);
287 288 289
    VIR_FREE(ctrl);
}

290

291 292 293
static int virLXCControllerAddConsole(virLXCControllerPtr ctrl,
                                      int hostFd)
{
294
    if (VIR_EXPAND_N(ctrl->consoles, ctrl->nconsoles, 1) < 0)
295
        return -1;
296
    ctrl->consoles[ctrl->nconsoles-1].server = ctrl->server;
297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321
    ctrl->consoles[ctrl->nconsoles-1].hostFd = hostFd;
    ctrl->consoles[ctrl->nconsoles-1].hostWatch = -1;

    ctrl->consoles[ctrl->nconsoles-1].contFd = -1;
    ctrl->consoles[ctrl->nconsoles-1].contWatch = -1;

    ctrl->consoles[ctrl->nconsoles-1].epollFd = -1;
    ctrl->consoles[ctrl->nconsoles-1].epollWatch = -1;
    return 0;
}


static int virLXCControllerConsoleSetNonblocking(virLXCControllerConsolePtr console)
{
    if (virSetBlocking(console->hostFd, false) < 0 ||
        virSetBlocking(console->contFd, false) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to set console file descriptor non-blocking"));
        return -1;
    }

    return 0;
}


322 323 324 325 326 327 328 329 330 331 332 333
static int virLXCControllerDaemonHandshake(virLXCControllerPtr ctrl)
{
    if (lxcContainerSendContinue(ctrl->handshakeFd) < 0) {
        virReportSystemError(errno, "%s",
                             _("error sending continue signal to daemon"));
        return -1;
    }
    VIR_FORCE_CLOSE(ctrl->handshakeFd);
    return 0;
}


334 335 336
static int virLXCControllerValidateNICs(virLXCControllerPtr ctrl)
{
    if (ctrl->def->nnets != ctrl->nveths) {
337
        virReportError(VIR_ERR_INTERNAL_ERROR,
338
                       _("expecting %zu veths, but got %zu"),
339
                       ctrl->def->nnets, ctrl->nveths);
340 341 342 343 344 345 346
        return -1;
    }

    return 0;
}


347 348 349
static int virLXCControllerValidateConsoles(virLXCControllerPtr ctrl)
{
    if (ctrl->def->nconsoles != ctrl->nconsoles) {
350
        virReportError(VIR_ERR_INTERNAL_ERROR,
351
                       _("expecting %zu consoles, but got %zu tty file handlers"),
352
                       ctrl->def->nconsoles, ctrl->nconsoles);
353 354 355 356 357 358 359
        return -1;
    }

    return 0;
}


360
static int virLXCControllerSetupLoopDeviceFS(virDomainFSDefPtr fs)
361
{
362
    int lofd;
363 364
    char *loname = NULL;

365
    if ((lofd = virFileLoopDeviceAssociate(fs->src, &loname)) < 0)
366 367
        return -1;

368 369
    VIR_DEBUG("Changing fs %s to use type=block for dev %s",
              fs->src, loname);
370 371 372 373 374 375 376 377 378 379 380 381 382
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
    fs->type = VIR_DOMAIN_FS_TYPE_BLOCK;
    VIR_FREE(fs->src);
    fs->src = loname;
    loname = NULL;

    return lofd;
}


383 384 385 386
static int virLXCControllerSetupLoopDeviceDisk(virDomainDiskDefPtr disk)
{
    int lofd;
    char *loname = NULL;
387
    const char *src = virDomainDiskGetSource(disk);
J
John Ferlan 已提交
388
    int ret = -1;
389

390
    if ((lofd = virFileLoopDeviceAssociate(src, &loname)) < 0)
391 392
        return -1;

393
    VIR_DEBUG("Changing disk %s to use type=block for dev %s",
394
              src, loname);
395

396 397 398 399
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
E
Eric Blake 已提交
400
    virDomainDiskSetType(disk, VIR_STORAGE_TYPE_BLOCK);
J
John Ferlan 已提交
401 402 403 404 405 406
    if (virDomainDiskSetSource(disk, loname) < 0)
        goto cleanup;

    ret = 0;

 cleanup:
407
    VIR_FREE(loname);
J
John Ferlan 已提交
408 409
    if (ret < 0)
         VIR_FORCE_CLOSE(lofd);
410 411

    return lofd;
J
John Ferlan 已提交
412

413 414 415
}


416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431
static int virLXCControllerSetupNBDDeviceFS(virDomainFSDefPtr fs)
{
    char *dev;

    if (fs->format <= VIR_STORAGE_FILE_NONE) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("An explicit disk format must be specified"));
        return -1;
    }

    if (virFileNBDDeviceAssociate(fs->src,
                                  fs->format,
                                  fs->readonly,
                                  &dev) < 0)
        return -1;

432 433
    VIR_DEBUG("Changing fs %s to use type=block for dev %s",
              fs->src, dev);
434 435 436 437
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
438
    fs->type = VIR_DOMAIN_FS_TYPE_BLOCK;
439 440 441 442 443 444 445 446 447 448
    VIR_FREE(fs->src);
    fs->src = dev;

    return 0;
}


static int virLXCControllerSetupNBDDeviceDisk(virDomainDiskDefPtr disk)
{
    char *dev;
449 450
    const char *src = virDomainDiskGetSource(disk);
    int format = virDomainDiskGetFormat(disk);
451

452
    if (format <= VIR_STORAGE_FILE_NONE) {
453 454 455 456 457
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("An explicit disk format must be specified"));
        return -1;
    }

458 459
    if (virFileNBDDeviceAssociate(src,
                                  format,
460
                                  disk->src->readonly,
461 462 463
                                  &dev) < 0)
        return -1;

464
    VIR_DEBUG("Changing disk %s to use type=block for dev %s",
465
              src, dev);
466 467 468 469
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
E
Eric Blake 已提交
470
    virDomainDiskSetType(disk, VIR_STORAGE_TYPE_BLOCK);
471 472 473 474 475
    if (virDomainDiskSetSource(disk, dev) < 0) {
        VIR_FREE(dev);
        return -1;
    }
    VIR_FREE(dev);
476 477 478 479 480

    return 0;
}


481
static int virLXCControllerSetupLoopDevices(virLXCControllerPtr ctrl)
482 483 484 485
{
    size_t i;
    int ret = -1;

486 487
    VIR_DEBUG("Setting up loop devices for filesystems");

488
    for (i = 0; i < ctrl->def->nfss; i++) {
489
        virDomainFSDefPtr fs = ctrl->def->fss[i];
490 491
        int fd;

492
        if (fs->type != VIR_DOMAIN_FS_TYPE_FILE)
493 494
            continue;

495 496 497 498 499 500 501 502
        if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_DEFAULT) {
            if (fs->format == VIR_STORAGE_FILE_RAW ||
                fs->format == VIR_STORAGE_FILE_NONE)
                fs->fsdriver = VIR_DOMAIN_FS_DRIVER_TYPE_LOOP;
            else
                fs->fsdriver = VIR_DOMAIN_FS_DRIVER_TYPE_NBD;
        }

503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521
        if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_LOOP) {
            if (fs->format != VIR_STORAGE_FILE_RAW &&
                fs->format != VIR_STORAGE_FILE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("fs format %s is not supported"),
                               virStorageFileFormatTypeToString(fs->format));
                goto cleanup;
            }

            fd = virLXCControllerSetupLoopDeviceFS(fs);
            if (fd < 0)
                goto cleanup;

            VIR_DEBUG("Saving loop fd %d", fd);
            if (VIR_EXPAND_N(ctrl->loopDevFds, ctrl->nloopDevs, 1) < 0) {
                VIR_FORCE_CLOSE(fd);
                goto cleanup;
            }
            ctrl->loopDevFds[ctrl->nloopDevs - 1] = fd;
522 523 524
        } else if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_NBD) {
            if (virLXCControllerSetupNBDDeviceFS(fs) < 0)
                goto cleanup;
525 526 527
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("fs driver %s is not supported"),
528
                           virDomainFSDriverTypeToString(fs->fsdriver));
529
            goto cleanup;
530 531 532
        }
    }

533 534
    VIR_DEBUG("Setting up loop devices for disks");

535
    for (i = 0; i < ctrl->def->ndisks; i++) {
536 537
        virDomainDiskDefPtr disk = ctrl->def->disks[i];
        int fd;
538 539
        const char *driver = virDomainDiskGetDriver(disk);
        int format = virDomainDiskGetFormat(disk);
540

E
Eric Blake 已提交
541
        if (virDomainDiskGetType(disk) != VIR_STORAGE_TYPE_FILE)
542 543
            continue;

544 545 546 547
        /* If no driverName is set, we prefer 'loop' for
         * dealing with raw or undefined formats, otherwise
         * we use 'nbd'.
         */
548 549 550 551 552 553
        if (STREQ_NULLABLE(driver, "loop") ||
            (!driver &&
             (format == VIR_STORAGE_FILE_RAW ||
              format == VIR_STORAGE_FILE_NONE))) {
            if (format != VIR_STORAGE_FILE_RAW &&
                format != VIR_STORAGE_FILE_NONE) {
554
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
555
                               _("disk format %s is not supported"),
556
                               virStorageFileFormatTypeToString(format));
557 558 559
                goto cleanup;
            }

560 561 562 563
            /* We treat 'none' as meaning 'raw' since we
             * don't want to go into the auto-probing
             * business for security reasons
             */
564 565 566 567
            fd = virLXCControllerSetupLoopDeviceDisk(disk);
            if (fd < 0)
                goto cleanup;

568 569 570 571 572 573
            VIR_DEBUG("Saving loop fd %d", fd);
            if (VIR_EXPAND_N(ctrl->loopDevFds, ctrl->nloopDevs, 1) < 0) {
                VIR_FORCE_CLOSE(fd);
                goto cleanup;
            }
            ctrl->loopDevFds[ctrl->nloopDevs - 1] = fd;
574
        } else if (!driver || STREQ(driver, "nbd")) {
575 576 577 578 579 580 581 582 583
            if (disk->cachemode != VIR_DOMAIN_DISK_CACHE_DEFAULT &&
                disk->cachemode != VIR_DOMAIN_DISK_CACHE_DISABLE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Disk cache mode %s is not supported"),
                               virDomainDiskCacheTypeToString(disk->cachemode));
                goto cleanup;
            }
            if (virLXCControllerSetupNBDDeviceDisk(disk) < 0)
                goto cleanup;
584
        } else {
585
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
586
                           _("disk driver %s is not supported"),
587
                           driver);
588
            goto cleanup;
589 590 591
        }
    }

592 593 594
    VIR_DEBUG("Setup all loop devices");
    ret = 0;

595
 cleanup:
596 597 598
    return ret;
}

599 600 601 602

/*
 * To be run while still single threaded
 */
603
static int virLXCControllerSetupCpuAffinity(virLXCControllerPtr ctrl)
604
{
H
Hu Tao 已提交
605 606
    int hostcpus, maxcpu = CPU_SETSIZE;
    virBitmapPtr cpumap, cpumapToSet;
607 608 609 610 611

    VIR_DEBUG("Setting CPU affinity");

    /* setaffinity fails if you set bits for CPUs which
     * aren't present, so we have to limit ourselves */
612 613 614
    if ((hostcpus = nodeGetCPUCount()) < 0)
        return -1;

615 616 617
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;

618 619
    cpumap = virBitmapNew(maxcpu);
    if (!cpumap)
620 621
        return -1;

H
Hu Tao 已提交
622 623
    cpumapToSet = cpumap;

624
    if (ctrl->def->cpumask) {
H
Hu Tao 已提交
625
        cpumapToSet = ctrl->def->cpumask;
626 627 628 629 630
    } else {
        /* You may think this is redundant, but we can't assume libvirtd
         * itself is running on all pCPUs, so we need to explicitly set
         * the spawned LXC instance to all pCPUs if no map is given in
         * its config file */
631
        virBitmapSetAll(cpumap);
632 633
    }

634
    /* We are presuming we are running between fork/exec of LXC
635 636 637
     * so use '0' to indicate our own process ID. No threads are
     * running at this point
     */
638
    if (virProcessSetAffinity(0 /* Self */, cpumapToSet) < 0) {
639
        virBitmapFree(cpumap);
640 641
        return -1;
    }
642
    virBitmapFree(cpumap);
643 644 645 646 647

    return 0;
}


648 649 650 651
static int virLXCControllerGetNumadAdvice(virLXCControllerPtr ctrl,
                                          virBitmapPtr *mask)
{
    virBitmapPtr nodemask = NULL;
652
    char *nodeset = NULL;
653 654 655 656 657
    int ret = -1;

    /* Get the advisory nodeset from numad if 'placement' of
     * either <vcpu> or <numatune> is 'auto'.
     */
658
    if (virDomainDefNeedsPlacementAdvice(ctrl->def)) {
659 660 661 662 663 664 665 666 667 668 669 670 671 672
        nodeset = virNumaGetAutoPlacementAdvice(ctrl->def->vcpus,
                                                ctrl->def->mem.cur_balloon);
        if (!nodeset)
            goto cleanup;

        VIR_DEBUG("Nodeset returned from numad: %s", nodeset);

        if (virBitmapParse(nodeset, 0, &nodemask, VIR_DOMAIN_CPUMASK_LEN) < 0)
            goto cleanup;
    }

    ret = 0;
    *mask = nodemask;

673
 cleanup:
674 675 676 677 678
    VIR_FREE(nodeset);
    return ret;
}


679
/**
680 681
 * virLXCControllerSetupResourceLimits
 * @ctrl: the controller state
682
 *
683 684 685
 * Sets up the non-cgroup based resource limits that need
 * to be inherited by the child process across clone()/exec().
 * The cgroup limits are setup later
686 687 688
 *
 * Returns 0 on success or -1 in case of error
 */
689
static int virLXCControllerSetupResourceLimits(virLXCControllerPtr ctrl)
690
{
691
    virBitmapPtr auto_nodeset = NULL;
692
    int ret = -1;
693 694 695 696 697 698 699 700
    virBitmapPtr nodeset = NULL;
    virDomainNumatuneMemMode mode;

    if (virLXCControllerGetNumadAdvice(ctrl, &auto_nodeset) < 0)
        goto cleanup;

    nodeset = virDomainNumatuneGetNodeset(ctrl->def->numatune, auto_nodeset, -1);
    mode = virDomainNumatuneGetMode(ctrl->def->numatune, -1);
701

702
    if (virNumaSetupMemoryPolicy(mode, nodeset) < 0)
703
        goto cleanup;
704

705
    if (virLXCControllerSetupCpuAffinity(ctrl) < 0)
706
        goto cleanup;
707

708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738
    ret = 0;
 cleanup:
    virBitmapFree(auto_nodeset);
    return ret;
}


/*
 * Creates the cgroup and sets up the various limits associated
 * with it
 */
static int virLXCControllerSetupCgroupLimits(virLXCControllerPtr ctrl)
{
    virBitmapPtr auto_nodeset = NULL;
    int ret = -1;
    virBitmapPtr nodeset = NULL;

    VIR_DEBUG("Setting up cgroup resource limits");

    if (virLXCControllerGetNumadAdvice(ctrl, &auto_nodeset) < 0)
        goto cleanup;

    nodeset = virDomainNumatuneGetNodeset(ctrl->def->numatune, auto_nodeset, -1);

    if (!(ctrl->cgroup = virLXCCgroupCreate(ctrl->def,
                                            ctrl->initpid)))
        goto cleanup;

    if (virCgroupAddTask(ctrl->cgroup, getpid()) < 0)
        goto cleanup;

739
    if (virLXCCgroupSetup(ctrl->def, ctrl->cgroup, nodeset) < 0)
740
        goto cleanup;
741

742
    ret = 0;
743
 cleanup:
744
    virBitmapFree(auto_nodeset);
745
    return ret;
D
Dan Smith 已提交
746 747
}

748

749 750 751 752 753 754 755 756 757 758 759 760 761
static void virLXCControllerClientCloseHook(virNetServerClientPtr client)
{
    virLXCControllerPtr ctrl = virNetServerClientGetPrivateData(client);

    VIR_DEBUG("Client %p has closed", client);
    if (ctrl->client == client)
        ctrl->client = NULL;
    if (ctrl->inShutdown) {
        VIR_DEBUG("Arm timer to quit event loop");
        virEventUpdateTimeout(ctrl->timerShutdown, 0);
    }
}

762 763
static void virLXCControllerClientPrivateFree(void *data)
{
764 765
    virLXCControllerPtr ctrl = data;
    VIR_DEBUG("Got private data free %p", ctrl);
766 767 768 769
}

static void *virLXCControllerClientPrivateNew(virNetServerClientPtr client,
                                              void *opaque)
770 771
{
    virLXCControllerPtr ctrl = opaque;
772

773 774 775
    virNetServerClientSetCloseHook(client, virLXCControllerClientCloseHook);
    VIR_DEBUG("Got new client %p", client);
    ctrl->client = client;
776 777 778 779 780

    if (ctrl->initpid && ctrl->firstClient)
        virLXCControllerEventSendInit(ctrl, ctrl->initpid);
    ctrl->firstClient = false;

781
    return ctrl;
782 783
}

784 785

static int virLXCControllerSetupServer(virLXCControllerPtr ctrl)
786
{
787 788
    virNetServerServicePtr svc = NULL;
    char *sockpath;
789

790
    if (virAsprintf(&sockpath, "%s/%s.sock",
791
                    LXC_STATE_DIR, ctrl->name) < 0)
792
        return -1;
793

794
    if (!(ctrl->server = virNetServerNew(0, 0, 0, 1,
795
                                         0, -1, 0, false,
796
                                         NULL,
797
                                         virLXCControllerClientPrivateNew,
798
                                         NULL,
799
                                         virLXCControllerClientPrivateFree,
800
                                         ctrl)))
C
Chris Lalancette 已提交
801
        goto error;
802

803 804 805
    if (virSecurityManagerSetSocketLabel(ctrl->securityManager, ctrl->def) < 0)
        goto error;

806 807 808 809
    if (!(svc = virNetServerServiceNewUNIX(sockpath,
                                           0700,
                                           0,
                                           0,
810
#if WITH_GNUTLS
811 812
                                           NULL,
#endif
813
                                           false,
M
Michal Privoznik 已提交
814
                                           0,
815
                                           5)))
816
        goto error;
817

818 819 820
    if (virSecurityManagerClearSocketLabel(ctrl->securityManager, ctrl->def) < 0)
        goto error;

821
    if (virNetServerAddService(ctrl->server, svc, NULL) < 0)
822
        goto error;
823
    virObjectUnref(svc);
824
    svc = NULL;
825

826 827 828 829
    if (!(ctrl->prog = virNetServerProgramNew(VIR_LXC_MONITOR_PROGRAM,
                                              VIR_LXC_MONITOR_PROGRAM_VERSION,
                                              virLXCMonitorProcs,
                                              virLXCMonitorNProcs)))
830 831
        goto error;

832 833 834
    virNetServerUpdateServices(ctrl->server, true);
    VIR_FREE(sockpath);
    return 0;
835

836
 error:
837
    VIR_FREE(sockpath);
838
    virObjectUnref(ctrl->server);
839
    ctrl->server = NULL;
840
    virObjectUnref(svc);
841 842
    return -1;
}
843

D
Daniel P. Berrange 已提交
844 845 846

static int lxcControllerClearCapabilities(void)
{
847
#if WITH_CAPNG
D
Daniel P. Berrange 已提交
848 849 850 851 852
    int ret;

    capng_clear(CAPNG_SELECT_BOTH);

    if ((ret = capng_apply(CAPNG_SELECT_BOTH)) < 0) {
853 854
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("failed to apply capabilities: %d"), ret);
D
Daniel P. Berrange 已提交
855 856 857
        return -1;
    }
#else
858
    VIR_WARN("libcap-ng support not compiled in, unable to clear capabilities");
D
Daniel P. Berrange 已提交
859 860 861 862
#endif
    return 0;
}

863
static bool wantReboot;
864
static virMutex lock = VIR_MUTEX_INITIALIZER;
865 866


867
static void virLXCControllerSignalChildIO(virNetServerPtr server,
868
                                          siginfo_t *info ATTRIBUTE_UNUSED,
869
                                          void *opaque)
870
{
871
    virLXCControllerPtr ctrl = opaque;
872
    int ret;
873
    int status;
874

875
    ret = waitpid(-1, &status, WNOHANG);
876
    VIR_DEBUG("Got sig child %d vs %lld", ret, (unsigned long long)ctrl->initpid);
877
    if (ret == ctrl->initpid) {
878
        virNetServerQuit(server);
879
        virMutexLock(&lock);
880
        if (WIFSIGNALED(status) &&
881 882
            WTERMSIG(status) == SIGHUP) {
            VIR_DEBUG("Status indicates reboot");
883
            wantReboot = true;
884
        }
885 886
        virMutexUnlock(&lock);
    }
887 888 889
}


890
static void virLXCControllerConsoleUpdateWatch(virLXCControllerConsolePtr console)
891 892 893 894
{
    int hostEvents = 0;
    int contEvents = 0;

895 896
    /* If host console is open, then we can look to read/write */
    if (!console->hostClosed) {
897 898 899 900 901
        if (console->fromHostLen < sizeof(console->fromHostBuf))
            hostEvents |= VIR_EVENT_HANDLE_READABLE;
        if (console->fromContLen)
            hostEvents |= VIR_EVENT_HANDLE_WRITABLE;
    }
902 903 904

    /* If cont console is open, then we can look to read/write */
    if (!console->contClosed) {
905 906 907 908 909 910
        if (console->fromContLen < sizeof(console->fromContBuf))
            contEvents |= VIR_EVENT_HANDLE_READABLE;
        if (console->fromHostLen)
            contEvents |= VIR_EVENT_HANDLE_WRITABLE;
    }

911 912 913
    VIR_DEBUG("Container watch=%d, events=%d closed=%d; host watch=%d events=%d closed=%d",
              console->contWatch, contEvents, console->contClosed,
              console->hostWatch, hostEvents, console->hostClosed);
914 915
    virEventUpdateHandle(console->contWatch, contEvents);
    virEventUpdateHandle(console->hostWatch, hostEvents);
916

917
    if (console->hostClosed) {
918
        /* Must setup an epoll to detect when host becomes accessible again */
919
        int events = EPOLLIN | EPOLLET;
920
        if (console->fromContLen)
921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936
            events |= EPOLLOUT;

        if (events != console->hostEpoll) {
            struct epoll_event event;
            int action = EPOLL_CTL_ADD;
            if (console->hostEpoll)
                action = EPOLL_CTL_MOD;

            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->hostEpoll);

            event.events = events;
            event.data.fd = console->hostFd;
            if (epoll_ctl(console->epollFd, action, console->hostFd, &event) < 0) {
                VIR_DEBUG(":fail");
                virReportSystemError(errno, "%s",
                                     _("Unable to add epoll fd"));
937
                virNetServerQuit(console->server);
938 939 940 941 942 943 944 945 946 947
                goto cleanup;
            }
            console->hostEpoll = events;
            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->hostEpoll);
        }
    } else if (console->hostEpoll) {
        VIR_DEBUG("Stop epoll oldContEvents=%x", console->hostEpoll);
        if (epoll_ctl(console->epollFd, EPOLL_CTL_DEL, console->hostFd, NULL) < 0) {
            virReportSystemError(errno, "%s",
                                 _("Unable to remove epoll fd"));
948 949
            VIR_DEBUG(":fail");
            virNetServerQuit(console->server);
950 951 952 953
            goto cleanup;
        }
        console->hostEpoll = 0;
    }
954

955
    if (console->contClosed) {
956
        /* Must setup an epoll to detect when guest becomes accessible again */
957
        int events = EPOLLIN | EPOLLET;
958
        if (console->fromHostLen)
959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974
            events |= EPOLLOUT;

        if (events != console->contEpoll) {
            struct epoll_event event;
            int action = EPOLL_CTL_ADD;
            if (console->contEpoll)
                action = EPOLL_CTL_MOD;

            VIR_DEBUG("newContEvents=%x oldContEvents=%x", events, console->contEpoll);

            event.events = events;
            event.data.fd = console->contFd;
            if (epoll_ctl(console->epollFd, action, console->contFd, &event) < 0) {
                virReportSystemError(errno, "%s",
                                     _("Unable to add epoll fd"));
                VIR_DEBUG(":fail");
975
                virNetServerQuit(console->server);
976 977 978 979 980 981 982 983 984 985
                goto cleanup;
            }
            console->contEpoll = events;
            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->contEpoll);
        }
    } else if (console->contEpoll) {
        VIR_DEBUG("Stop epoll oldContEvents=%x", console->contEpoll);
        if (epoll_ctl(console->epollFd, EPOLL_CTL_DEL, console->contFd, NULL) < 0) {
            virReportSystemError(errno, "%s",
                                 _("Unable to remove epoll fd"));
986 987
            VIR_DEBUG(":fail");
            virNetServerQuit(console->server);
988 989 990 991
            goto cleanup;
        }
        console->contEpoll = 0;
    }
992
 cleanup:
993 994
    return;
}
995 996


997
static void virLXCControllerConsoleEPoll(int watch, int fd, int events, void *opaque)
998
{
999
    virLXCControllerConsolePtr console = opaque;
1000

1001 1002 1003 1004 1005 1006 1007 1008 1009 1010
    virMutexLock(&lock);
    VIR_DEBUG("IO event watch=%d fd=%d events=%d fromHost=%zu fromcont=%zu",
              watch, fd, events,
              console->fromHostLen,
              console->fromContLen);

    while (1) {
        struct epoll_event event;
        int ret;
        ret = epoll_wait(console->epollFd, &event, 1, 0);
1011
        if (ret < 0) {
S
Stefan Berger 已提交
1012
            if (errno == EINTR)
1013 1014 1015
                continue;
            virReportSystemError(errno, "%s",
                                 _("Unable to wait on epoll"));
1016
            virNetServerQuit(console->server);
1017 1018 1019
            goto cleanup;
        }

1020 1021 1022 1023 1024 1025 1026
        if (ret == 0)
            break;

        VIR_DEBUG("fd=%d hostFd=%d contFd=%d hostEpoll=%x contEpoll=%x",
                  event.data.fd, console->hostFd, console->contFd,
                  console->hostEpoll, console->contEpoll);

1027 1028
        /* If we get HUP+dead PID, we just re-enable the main loop
         * which will see the PID has died and exit */
1029
        if ((event.events & (EPOLLIN|EPOLLOUT))) {
1030 1031
            if (event.data.fd == console->hostFd) {
                console->hostClosed = false;
1032
            } else {
1033
                console->contClosed = false;
1034
            }
1035
            virLXCControllerConsoleUpdateWatch(console);
1036 1037 1038 1039
            break;
        }
    }

1040
 cleanup:
1041
    virMutexUnlock(&lock);
1042 1043
}

1044
static void virLXCControllerConsoleIO(int watch, int fd, int events, void *opaque)
1045
{
1046
    virLXCControllerConsolePtr console = opaque;
1047 1048

    virMutexLock(&lock);
1049 1050 1051 1052
    VIR_DEBUG("IO event watch=%d fd=%d events=%d fromHost=%zu fromcont=%zu",
              watch, fd, events,
              console->fromHostLen,
              console->fromContLen);
1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120
    if (events & VIR_EVENT_HANDLE_READABLE) {
        char *buf;
        size_t *len;
        size_t avail;
        ssize_t done;
        if (watch == console->hostWatch) {
            buf = console->fromHostBuf;
            len = &console->fromHostLen;
            avail = sizeof(console->fromHostBuf) - *len;
        } else {
            buf = console->fromContBuf;
            len = &console->fromContLen;
            avail = sizeof(console->fromContBuf) - *len;
        }
    reread:
        done = read(fd, buf + *len, avail);
        if (done == -1 && errno == EINTR)
            goto reread;
        if (done == -1 && errno != EAGAIN) {
            virReportSystemError(errno, "%s",
                                 _("Unable to read container pty"));
            goto error;
        }
        if (done > 0) {
            *len += done;
        } else {
            VIR_DEBUG("Read fd %d done %d errno %d", fd, (int)done, errno);
        }
    }

    if (events & VIR_EVENT_HANDLE_WRITABLE) {
        char *buf;
        size_t *len;
        ssize_t done;
        if (watch == console->hostWatch) {
            buf = console->fromContBuf;
            len = &console->fromContLen;
        } else {
            buf = console->fromHostBuf;
            len = &console->fromHostLen;
        }

    rewrite:
        done = write(fd, buf, *len);
        if (done == -1 && errno == EINTR)
            goto rewrite;
        if (done == -1 && errno != EAGAIN) {
            virReportSystemError(errno, "%s",
                                 _("Unable to write to container pty"));
            goto error;
        }
        if (done > 0) {
            memmove(buf, buf + done, (*len - done));
            *len -= done;
        } else {
            VIR_DEBUG("Write fd %d done %d errno %d", fd, (int)done, errno);
        }
    }

    if (events & VIR_EVENT_HANDLE_HANGUP) {
        if (watch == console->hostWatch) {
            console->hostClosed = true;
        } else {
            console->contClosed = true;
        }
        VIR_DEBUG("Got EOF on %d %d", watch, fd);
    }

1121
    virLXCControllerConsoleUpdateWatch(console);
1122 1123 1124
    virMutexUnlock(&lock);
    return;

1125
 error:
1126 1127 1128
    virEventRemoveHandle(console->contWatch);
    virEventRemoveHandle(console->hostWatch);
    console->contWatch = console->hostWatch = -1;
1129
    virNetServerQuit(console->server);
1130 1131 1132 1133
    virMutexUnlock(&lock);
}


1134
/**
1135
 * lxcControllerMain
1136 1137
 * @serverFd: server socket fd to accept client requests
 * @clientFd: initial client which is the libvirtd daemon
1138
 *
1139
 * Processes I/O on consoles and the monitor
1140 1141 1142
 *
 * Returns 0 on success or -1 in case of error
 */
1143
static int virLXCControllerMain(virLXCControllerPtr ctrl)
1144
{
1145
    virErrorPtr err;
1146
    int rc = -1;
1147
    size_t i;
1148

1149 1150 1151 1152
    if (virNetServerAddSignalHandler(ctrl->server,
                                     SIGCHLD,
                                     virLXCControllerSignalChildIO,
                                     ctrl) < 0)
1153 1154
        goto cleanup;

1155 1156
    virResetLastError();

1157
    for (i = 0; i < ctrl->nconsoles; i++) {
1158
        if ((ctrl->consoles[i].epollFd = epoll_create1(EPOLL_CLOEXEC)) < 0) {
1159 1160 1161 1162 1163
            virReportSystemError(errno, "%s",
                                 _("Unable to create epoll fd"));
            goto cleanup;
        }

1164 1165 1166 1167 1168
        if ((ctrl->consoles[i].epollWatch = virEventAddHandle(ctrl->consoles[i].epollFd,
                                                              VIR_EVENT_HANDLE_READABLE,
                                                              virLXCControllerConsoleEPoll,
                                                              &(ctrl->consoles[i]),
                                                              NULL)) < 0) {
1169 1170
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch epoll FD"));
1171 1172 1173
            goto cleanup;
        }

1174 1175 1176 1177 1178
        if ((ctrl->consoles[i].hostWatch = virEventAddHandle(ctrl->consoles[i].hostFd,
                                                             VIR_EVENT_HANDLE_READABLE,
                                                             virLXCControllerConsoleIO,
                                                             &(ctrl->consoles[i]),
                                                             NULL)) < 0) {
1179 1180
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch host console PTY"));
1181 1182 1183
            goto cleanup;
        }

1184 1185 1186 1187 1188
        if ((ctrl->consoles[i].contWatch = virEventAddHandle(ctrl->consoles[i].contFd,
                                                             VIR_EVENT_HANDLE_READABLE,
                                                             virLXCControllerConsoleIO,
                                                             &(ctrl->consoles[i]),
                                                             NULL)) < 0) {
1189 1190
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch host console PTY"));
1191 1192
            goto cleanup;
        }
1193
    }
1194

1195
    virNetServerRun(ctrl->server);
1196

1197 1198
    err = virGetLastError();
    if (!err || err->code == VIR_ERR_OK)
1199
        rc = wantReboot ? 1 : 0;
1200

1201
 cleanup:
1202
    for (i = 0; i < ctrl->nconsoles; i++)
1203
        virLXCControllerConsoleClose(&(ctrl->consoles[i]));
1204

1205 1206 1207
    return rc;
}

1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221
static unsigned int
virLXCControllerLookupUsernsMap(virDomainIdMapEntryPtr map,
                                int num,
                                unsigned int src)
{
    size_t i;

    for (i = 0; i < num; i++) {
        if (src > map[i].start && src < map[i].start + map[i].count)
            return map[i].target + (src - map[i].start);
    }

    return src;
}
1222

1223 1224 1225 1226 1227 1228
static int
virLXCControllerSetupUsernsMap(virDomainIdMapEntryPtr map,
                               int num,
                               char *path)
{
    virBuffer map_value = VIR_BUFFER_INITIALIZER;
1229 1230
    size_t i;
    int ret = -1;
1231 1232 1233 1234 1235

    for (i = 0; i < num; i++)
        virBufferAsprintf(&map_value, "%u %u %u\n",
                          map[i].start, map[i].target, map[i].count);

1236 1237
    if (virBufferCheckError(&map_value) < 0)
        goto cleanup;
1238

1239 1240
    VIR_DEBUG("Set '%s' to '%s'", path, virBufferCurrentContent(&map_value));

1241 1242 1243 1244 1245 1246
    if (virFileWriteStr(path, virBufferCurrentContent(&map_value), 0) < 0) {
        virReportSystemError(errno, _("unable write to %s"), path);
        goto cleanup;
    }

    ret = 0;
1247
 cleanup:
1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285
    virBufferFreeAndReset(&map_value);
    return ret;
}

/**
 * virLXCControllerSetupUserns
 *
 * Set proc files for user namespace
 *
 * Returns 0 on success or -1 in case of error
 */
static int virLXCControllerSetupUserns(virLXCControllerPtr ctrl)
{
    char *uid_map = NULL;
    char *gid_map = NULL;
    int ret = -1;

    /* User namespace is disabled for container */
    if (ctrl->def->idmap.nuidmap == 0)
        return 0;

    if (virAsprintf(&uid_map, "/proc/%d/uid_map", ctrl->initpid) < 0)
        goto cleanup;

    if (virLXCControllerSetupUsernsMap(ctrl->def->idmap.uidmap,
                                       ctrl->def->idmap.nuidmap,
                                       uid_map) < 0)
        goto cleanup;

    if (virAsprintf(&gid_map, "/proc/%d/gid_map", ctrl->initpid) < 0)
        goto cleanup;

    if (virLXCControllerSetupUsernsMap(ctrl->def->idmap.gidmap,
                                       ctrl->def->idmap.ngidmap,
                                       gid_map) < 0)
        goto cleanup;

    ret = 0;
1286
 cleanup:
1287 1288 1289 1290 1291
    VIR_FREE(uid_map);
    VIR_FREE(gid_map);
    return ret;
}

1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304
static int virLXCControllerSetupDev(virLXCControllerPtr ctrl)
{
    char *mount_options = NULL;
    char *opts = NULL;
    char *dev = NULL;
    int ret = -1;

    VIR_DEBUG("Setting up /dev/ for container");

    mount_options = virSecurityManagerGetMountOptions(ctrl->securityManager,
                                                      ctrl->def);

    if (virAsprintf(&dev, "/%s/%s.dev",
1305
                    LXC_STATE_DIR, ctrl->def->name) < 0)
1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319
        goto cleanup;

    if (virFileMakePath(dev) < 0) {
        virReportSystemError(errno,
                             _("Failed to make path %s"), dev);
        goto cleanup;
    }

    /*
     * tmpfs is limited to 64kb, since we only have device nodes in there
     * and don't want to DOS the entire OS RAM usage
     */

    if (virAsprintf(&opts,
1320
                    "mode=755,size=65536%s", mount_options) < 0)
1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331
        goto cleanup;

    VIR_DEBUG("Mount devfs on %s type=tmpfs flags=%x, opts=%s",
              dev, MS_NOSUID, opts);
    if (mount("devfs", dev, "tmpfs", MS_NOSUID, opts) < 0) {
        virReportSystemError(errno,
                             _("Failed to mount devfs on %s type %s (%s)"),
                             dev, "tmpfs", opts);
        goto cleanup;
    }

1332
    if (lxcContainerChown(ctrl->def, dev) < 0)
1333 1334
        goto cleanup;

1335
    ret = 0;
1336
 cleanup:
1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358
    VIR_FREE(opts);
    VIR_FREE(mount_options);
    VIR_FREE(dev);
    return ret;
}

static int virLXCControllerPopulateDevices(virLXCControllerPtr ctrl)
{
    size_t i;
    int ret = -1;
    char *path = NULL;
    const struct {
        int maj;
        int min;
        mode_t mode;
        const char *path;
    } devs[] = {
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_NULL, 0666, "/null" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_ZERO, 0666, "/zero" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_FULL, 0666, "/full" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_RANDOM, 0666, "/random" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_URANDOM, 0666, "/urandom" },
1359
        { LXC_DEV_MAJ_TTY, LXC_DEV_MIN_TTY, 0666, "/tty" },
1360 1361 1362 1363 1364 1365 1366 1367
    };

    if (virLXCControllerSetupDev(ctrl) < 0)
        goto cleanup;

    /* Populate /dev/ with a few important bits */
    for (i = 0; i < ARRAY_CARDINALITY(devs); i++) {
        if (virAsprintf(&path, "/%s/%s.dev/%s",
1368
                        LXC_STATE_DIR, ctrl->def->name, devs[i].path) < 0)
1369 1370 1371 1372 1373 1374 1375 1376 1377 1378
            goto cleanup;

        dev_t dev = makedev(devs[i].maj, devs[i].min);
        if (mknod(path, S_IFCHR, dev) < 0 ||
            chmod(path, devs[i].mode)) {
            virReportSystemError(errno,
                                 _("Failed to make device %s"),
                                 path);
            goto cleanup;
        }
1379

1380
        if (lxcContainerChown(ctrl->def, path) < 0)
1381 1382
            goto cleanup;

1383 1384 1385 1386
        VIR_FREE(path);
    }

    ret = 0;
1387
 cleanup:
1388 1389 1390
    VIR_FREE(path);
    return ret;
}
1391

1392

1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404
static int
virLXCControllerSetupHostdevSubsysUSB(virDomainDefPtr vmDef,
                                      virDomainHostdevDefPtr def,
                                      virSecurityManagerPtr securityDriver)
{
    int ret = -1;
    char *src = NULL;
    char *dstdir = NULL;
    char *dstfile = NULL;
    char *vroot = NULL;
    struct stat sb;
    mode_t mode;
1405
    virDomainHostdevSubsysUSBPtr usbsrc = &def->source.subsys.u.usb;
1406 1407

    if (virAsprintf(&src, USB_DEVFS "/%03d/%03d",
1408
                    usbsrc->bus, usbsrc->device) < 0)
1409 1410 1411 1412 1413 1414
        goto cleanup;

    if (virAsprintf(&vroot, "/%s/%s.dev/bus/usb/",
                    LXC_STATE_DIR, vmDef->name) < 0)
        goto cleanup;

1415
    if (virAsprintf(&dstdir, "%s/%03d/", vroot, usbsrc->bus) < 0)
1416 1417
        goto cleanup;

1418
    if (virAsprintf(&dstfile, "%s/%03d", dstdir, usbsrc->device) < 0)
1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450
        goto cleanup;

    if (stat(src, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"), src);
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("USB source %s was not a character device"),
                       src);
        goto cleanup;
    }

    mode = 0700 | S_IFCHR;

    if (virFileMakePath(dstdir) < 0) {
        virReportSystemError(errno,
                             _("Unable to create %s"), dstdir);
        goto cleanup;
    }

    VIR_DEBUG("Creating dev %s (%d,%d)",
              dstfile, major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dstfile, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dstfile);
        goto cleanup;
    }

1451 1452 1453
    if (lxcContainerChown(vmDef, dstfile) < 0)
        goto cleanup;

1454 1455 1456 1457 1458 1459
    if (virSecurityManagerSetHostdevLabel(securityDriver,
                                          vmDef, def, vroot) < 0)
        goto cleanup;

    ret = 0;

1460
 cleanup:
1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530
    VIR_FREE(src);
    VIR_FREE(dstfile);
    VIR_FREE(dstdir);
    VIR_FREE(vroot);
    return ret;
}


static int
virLXCControllerSetupHostdevCapsStorage(virDomainDefPtr vmDef,
                                        virDomainHostdevDefPtr def,
                                        virSecurityManagerPtr securityDriver)
{
    char *dst = NULL;
    char *path = NULL;
    int len = 0;
    int ret = -1;
    struct stat sb;
    mode_t mode;
    char *dev = def->source.caps.u.storage.block;

    if (dev == NULL) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Missing storage host block path"));
        goto cleanup;
    }

    if (VIR_STRDUP(path, dev) < 0)
        goto cleanup;

    while (*(path + len) == '/')
        len++;

    if (virAsprintf(&dst, "/%s/%s.dev/%s",
                    LXC_STATE_DIR, vmDef->name,
                    strchr(path + len, '/')) < 0)
        goto cleanup;

    if (stat(dev, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"),
                             dev);
        goto cleanup;
    }

    if (!S_ISBLK(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Storage source %s must be a block device"),
                       dev);
        goto cleanup;
    }

    if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
        virReportError(errno,
                       _("Failed to create directory for device %s"),
                       dev);
        goto cleanup;
    }

    mode = 0700 | S_IFBLK;

    VIR_DEBUG("Creating dev %s (%d,%d)", dst,
              major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dst);
        goto cleanup;
    }

1531 1532 1533
    if (lxcContainerChown(vmDef, dst) < 0)
        goto cleanup;

1534 1535 1536 1537 1538 1539
    def->source.caps.u.storage.block = dst;
    if (virSecurityManagerSetHostdevLabel(securityDriver, vmDef, def, NULL) < 0)
        goto cleanup;

    ret = 0;

1540
 cleanup:
1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609
    def->source.caps.u.storage.block = dev;
    VIR_FREE(dst);
    VIR_FREE(path);
    return ret;
}


static int
virLXCControllerSetupHostdevCapsMisc(virDomainDefPtr vmDef,
                                     virDomainHostdevDefPtr def,
                                     virSecurityManagerPtr securityDriver)
{
    char *dst = NULL;
    char *path = NULL;
    int len = 0;
    int ret = -1;
    struct stat sb;
    mode_t mode;
    char *dev = def->source.caps.u.misc.chardev;

    if (dev == NULL) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Missing storage host block path"));
        goto cleanup;
    }

    if (VIR_STRDUP(path, dev) < 0)
        goto cleanup;

    while (*(path + len) == '/')
        len++;

    if (virAsprintf(&dst, "/%s/%s.dev/%s",
                    LXC_STATE_DIR, vmDef->name,
                    strchr(path + len, '/')) < 0)
        goto cleanup;

    if (stat(dev, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"),
                             dev);
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Storage source %s must be a character device"),
                       dev);
        goto cleanup;
    }

    if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
        virReportError(errno,
                       _("Failed to create directory for device %s"),
                       dst);
        goto cleanup;
    }

    mode = 0700 | S_IFCHR;

    VIR_DEBUG("Creating dev %s (%d,%d)", dst,
              major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dev);
        goto cleanup;
    }

1610 1611 1612
    if (lxcContainerChown(vmDef, dst) < 0)
        goto cleanup;

1613 1614 1615 1616 1617 1618
    def->source.caps.u.misc.chardev = dst;
    if (virSecurityManagerSetHostdevLabel(securityDriver, vmDef, def, NULL) < 0)
        goto cleanup;

    ret = 0;

1619
 cleanup:
1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709
    def->source.caps.u.misc.chardev = dev;
    VIR_FREE(dst);
    VIR_FREE(path);
    return ret;
}

static int
virLXCControllerSetupHostdevSubsys(virDomainDefPtr vmDef,
                                   virDomainHostdevDefPtr def,
                                   virSecurityManagerPtr securityDriver)
{
    switch (def->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
        return virLXCControllerSetupHostdevSubsysUSB(vmDef,
                                                     def,
                                                     securityDriver);

    default:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported host device mode %s"),
                       virDomainHostdevSubsysTypeToString(def->source.subsys.type));
        return -1;
    }
}


static int
virLXCControllerSetupHostdevCaps(virDomainDefPtr vmDef,
                                 virDomainHostdevDefPtr def,
                                 virSecurityManagerPtr securityDriver)
{
    switch (def->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_STORAGE:
        return virLXCControllerSetupHostdevCapsStorage(vmDef,
                                                       def,
                                                       securityDriver);

    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_MISC:
        return virLXCControllerSetupHostdevCapsMisc(vmDef,
                                                    def,
                                                    securityDriver);

    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_NET:
        return 0; // case is handled in virLXCControllerMoveInterfaces

    default:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported host device mode %s"),
                       virDomainHostdevCapsTypeToString(def->source.subsys.type));
        return -1;
    }
}


static int
virLXCControllerSetupAllHostdevs(virLXCControllerPtr ctrl)
{
    size_t i;
    virDomainDefPtr vmDef = ctrl->def;
    virSecurityManagerPtr securityDriver = ctrl->securityManager;
    VIR_DEBUG("Setting up hostdevs");

    for (i = 0; i < vmDef->nhostdevs; i++) {
        virDomainHostdevDefPtr def = vmDef->hostdevs[i];
        switch (def->mode) {
        case VIR_DOMAIN_HOSTDEV_MODE_SUBSYS:
            if (virLXCControllerSetupHostdevSubsys(vmDef,
                                                   def,
                                                   securityDriver) < 0)
                return -1;
            break;
        case VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES:
            if (virLXCControllerSetupHostdevCaps(vmDef,
                                                 def,
                                                 securityDriver) < 0)
                return -1;
            break;
        default:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported host device mode %s"),
                           virDomainHostdevModeTypeToString(def->mode));
            return -1;
        }
    }

    VIR_DEBUG("Setup all hostdevs");
    return 0;
}


1710 1711 1712 1713 1714 1715 1716 1717
static int virLXCControllerSetupDisk(virLXCControllerPtr ctrl,
                                     virDomainDiskDefPtr def,
                                     virSecurityManagerPtr securityDriver)
{
    char *dst = NULL;
    int ret = -1;
    struct stat sb;
    mode_t mode;
1718
    char *tmpsrc = def->src->path;
1719

E
Eric Blake 已提交
1720
    if (virDomainDiskGetType(def) != VIR_STORAGE_TYPE_BLOCK) {
1721 1722 1723 1724
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Can't setup disk for non-block device"));
        goto cleanup;
    }
1725
    if (!tmpsrc) {
1726 1727 1728 1729 1730 1731 1732 1733 1734
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Can't setup disk without media"));
        goto cleanup;
    }

    if (virAsprintf(&dst, "/%s/%s.dev/%s",
                    LXC_STATE_DIR, ctrl->def->name, def->dst) < 0)
        goto cleanup;

1735
    if (stat(def->src->path, &sb) < 0) {
1736
        virReportSystemError(errno,
1737
                             _("Unable to access %s"), tmpsrc);
1738 1739 1740 1741 1742 1743
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode) && !S_ISBLK(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Disk source %s must be a character/block device"),
1744
                       tmpsrc);
1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761
        goto cleanup;
    }

    mode = 0700;
    if (S_ISCHR(sb.st_mode))
        mode |= S_IFCHR;
    else
        mode |= S_IFBLK;

    /* Yes, the device name we're creating may not
     * actually correspond to the major:minor number
     * we're using, but we've no other option at this
     * time. Just have to hope that containerized apps
     * don't get upset that the major:minor is different
     * to that normally implied by the device name
     */
    VIR_DEBUG("Creating dev %s (%d,%d) from %s",
1762
              dst, major(sb.st_rdev), minor(sb.st_rdev), tmpsrc);
1763 1764 1765 1766 1767 1768 1769
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dst);
        goto cleanup;
    }

1770
    if (lxcContainerChown(ctrl->def, dst) < 0)
1771 1772
        goto cleanup;

1773
    /* Labelling normally operates on src, but we need
E
Eric Blake 已提交
1774
     * to actually label the dst here, so hack the config */
1775
    def->src->path = dst;
1776
    if (virSecurityManagerSetDiskLabel(securityDriver, ctrl->def, def) < 0)
1777 1778 1779 1780
        goto cleanup;

    ret = 0;

1781
 cleanup:
1782
    def->src->path = tmpsrc;
1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803
    VIR_FREE(dst);
    return ret;
}

static int virLXCControllerSetupAllDisks(virLXCControllerPtr ctrl)
{
    size_t i;
    VIR_DEBUG("Setting up disks");

    for (i = 0; i < ctrl->def->ndisks; i++) {
        if (virLXCControllerSetupDisk(ctrl, ctrl->def->disks[i],
                                      ctrl->securityManager) < 0)
            return -1;
    }

    VIR_DEBUG("Setup all disks");
    return 0;
}



1804
/**
1805
 * virLXCControllerMoveInterfaces
1806 1807 1808 1809 1810 1811 1812 1813
 * @nveths: number of interfaces
 * @veths: interface names
 * @container: pid of container
 *
 * Moves network interfaces into a container's namespace
 *
 * Returns 0 on success or -1 in case of error
 */
1814
static int virLXCControllerMoveInterfaces(virLXCControllerPtr ctrl)
1815
{
1816
    size_t i;
1817
    virDomainDefPtr def = ctrl->def;
1818

1819
    for (i = 0; i < ctrl->nveths; i++) {
1820
        if (virNetDevSetNamespace(ctrl->veths[i], ctrl->initpid) < 0)
1821
            return -1;
1822
    }
1823

1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838
    for (i = 0; i < def->nhostdevs; i ++) {
        virDomainHostdevDefPtr hdev = def->hostdevs[i];

        if (hdev->mode != VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES)
            continue;

        virDomainHostdevCaps hdcaps = hdev->source.caps;

        if (hdcaps.type != VIR_DOMAIN_HOSTDEV_CAPS_TYPE_NET)
           continue;

        if (virNetDevSetNamespace(hdcaps.u.net.iface, ctrl->initpid) < 0)
            return -1;
    }

1839 1840 1841 1842 1843
    return 0;
}


/**
1844 1845
 * virLXCControllerDeleteInterfaces:
 * @ctrl: the LXC controller
1846 1847 1848 1849 1850
 *
 * Cleans up the container interfaces by deleting the veth device pairs.
 *
 * Returns 0 on success or -1 in case of error
 */
1851
static int virLXCControllerDeleteInterfaces(virLXCControllerPtr ctrl)
1852
{
1853 1854
    size_t i;
    int ret = 0;
1855

1856
    for (i = 0; i < ctrl->nveths; i++) {
1857 1858 1859 1860 1861
        if (virNetDevVethDelete(ctrl->veths[i]) < 0)
            ret = -1;
    }

    return ret;
1862 1863
}

1864

1865 1866
static int lxcSetPersonality(virDomainDefPtr def)
{
1867
    virArch altArch;
1868

1869
    altArch = lxcContainerGetAlt32bitArch(virArchFromHost());
1870
    if (altArch &&
1871
        (def->os.arch == altArch)) {
1872 1873
        if (personality(PER_LINUX32) < 0) {
            virReportSystemError(errno, _("Unable to request personality for %s on %s"),
1874 1875
                                 virArchToString(altArch),
                                 virArchToString(virArchFromHost()));
1876 1877 1878 1879 1880 1881
            return -1;
        }
    }
    return 0;
}

1882
#ifndef MS_REC
1883
# define MS_REC          16384
1884 1885 1886
#endif

#ifndef MS_SLAVE
1887
# define MS_SLAVE              (1<<19)
1888
#endif
1889

1890 1891 1892 1893 1894 1895
/* Create a private tty using the private devpts at PTMX, returning
 * the master in *TTYMASTER and the name of the slave, _from the
 * perspective of the guest after remounting file systems_, in
 * *TTYNAME.  Heavily borrowed from glibc, but doesn't require that
 * devpts == "/dev/pts" */
static int
1896 1897
lxcCreateTty(virLXCControllerPtr ctrl, int *ttymaster,
             char **ttyName, char **ttyHostPath)
1898 1899 1900 1901 1902
{
    int ret = -1;
    int ptyno;
    int unlock = 0;

1903
    if ((*ttymaster = open(ctrl->devptmx, O_RDWR|O_NOCTTY|O_NONBLOCK)) < 0)
1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917
        goto cleanup;

    if (ioctl(*ttymaster, TIOCSPTLCK, &unlock) < 0)
        goto cleanup;

    if (ioctl(*ttymaster, TIOCGPTN, &ptyno) < 0)
        goto cleanup;

    /* If mount() succeeded at honoring newinstance, then the kernel
     * was new enough to also honor the mode=0620,gid=5 options, which
     * guarantee that the new pty already has correct permissions; so
     * while glibc has to fstat(), fchmod(), and fchown() for older
     * kernels, we can skip those steps.  ptyno shouldn't currently be
     * anything other than 0, but let's play it safe.  */
1918 1919 1920
    if ((virAsprintf(ttyName, "/dev/pts/%d", ptyno) < 0) ||
        (virAsprintf(ttyHostPath, "/%s/%s.devpts/%d", LXC_STATE_DIR,
                    ctrl->def->name, ptyno) < 0)) {
1921 1922 1923 1924 1925 1926
        errno = ENOMEM;
        goto cleanup;
    }

    ret = 0;

1927
 cleanup:
1928 1929 1930 1931 1932 1933 1934 1935
    if (ret != 0) {
        VIR_FORCE_CLOSE(*ttymaster);
        VIR_FREE(*ttyName);
    }

    return ret;
}

1936

1937 1938 1939 1940 1941
static int
virLXCControllerSetupPrivateNS(void)
{
    int ret = -1;

1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962
    /*
     * If doing a chroot style setup, we need to prepare
     * a private /dev/pts for the child now, which they
     * will later move into position.
     *
     * This is complex because 'virsh console' needs to
     * use /dev/pts from the host OS, and the guest OS
     * needs to use /dev/pts from the guest.
     *
     * This means that we (libvirt_lxc) need to see and
     * use both /dev/pts instances. We're running in the
     * host OS context though and don't want to expose
     * the guest OS /dev/pts there.
     *
     * Thus we call unshare(CLONE_NS) so that we can see
     * the guest's new /dev/pts, without it becoming
     * visible to the host OS. We also put the root FS
     * into slave mode, just in case it was currently
     * marked as shared
     */

1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975
    if (unshare(CLONE_NEWNS) < 0) {
        virReportSystemError(errno, "%s",
                             _("Cannot unshare mount namespace"));
        goto cleanup;
    }

    if (mount("", "/", NULL, MS_SLAVE|MS_REC, NULL) < 0) {
        virReportSystemError(errno, "%s",
                             _("Failed to switch root mount into slave mode"));
        goto cleanup;
    }

    ret = 0;
1976
 cleanup:
1977 1978 1979 1980
    return ret;
}


1981
static int
1982
virLXCControllerSetupDevPTS(virLXCControllerPtr ctrl)
1983
{
1984
    char *mount_options = NULL;
1985
    char *opts = NULL;
1986 1987
    char *devpts = NULL;
    int ret = -1;
1988
    gid_t ptsgid = 5;
1989

1990
    VIR_DEBUG("Setting up private /dev/pts");
1991

1992 1993
    mount_options = virSecurityManagerGetMountOptions(ctrl->securityManager,
                                                      ctrl->def);
1994

1995 1996 1997
    if (virAsprintf(&devpts, "%s/%s.devpts",
                    LXC_STATE_DIR, ctrl->def->name) < 0 ||
        virAsprintf(&ctrl->devptmx, "%s/%s.devpts/ptmx",
1998
                    LXC_STATE_DIR, ctrl->def->name) < 0)
1999
        goto cleanup;
2000

2001 2002 2003 2004 2005 2006
    if (virFileMakePath(devpts) < 0) {
        virReportSystemError(errno,
                             _("Failed to make path %s"),
                             devpts);
        goto cleanup;
    }
2007

2008 2009 2010 2011 2012
    if (ctrl->def->idmap.ngidmap)
        ptsgid = virLXCControllerLookupUsernsMap(ctrl->def->idmap.gidmap,
                                                 ctrl->def->idmap.ngidmap,
                                                 ptsgid);

2013 2014
    /* XXX should we support gid=X for X!=5 for distros which use
     * a different gid for tty?  */
2015 2016
    if (virAsprintf(&opts, "newinstance,ptmxmode=0666,mode=0620,gid=%u%s",
                    ptsgid, (mount_options ? mount_options : "")) < 0)
2017
        goto cleanup;
2018

2019 2020 2021 2022 2023 2024 2025 2026
    VIR_DEBUG("Mount devpts on %s type=tmpfs flags=%x, opts=%s",
              devpts, MS_NOSUID, opts);
    if (mount("devpts", devpts, "devpts", MS_NOSUID, opts) < 0) {
        virReportSystemError(errno,
                             _("Failed to mount devpts on %s"),
                             devpts);
        goto cleanup;
    }
2027

2028
    if (access(ctrl->devptmx, R_OK) < 0) {
2029 2030 2031
        virReportSystemError(ENOSYS, "%s",
                             _("Kernel does not support private devpts"));
        goto cleanup;
2032 2033
    }

2034 2035
    if ((lxcContainerChown(ctrl->def, ctrl->devptmx) < 0) ||
        (lxcContainerChown(ctrl->def, devpts) < 0))
2036 2037
         goto cleanup;

2038 2039
    ret = 0;

2040
 cleanup:
2041 2042
    VIR_FREE(opts);
    VIR_FREE(devpts);
2043
    VIR_FREE(mount_options);
2044 2045 2046 2047
    return ret;
}


G
Gao feng 已提交
2048 2049 2050 2051 2052 2053
static int
virLXCControllerSetupFuse(virLXCControllerPtr ctrl)
{
    return lxcSetupFuse(&ctrl->fuse, ctrl->def);
}

2054 2055 2056 2057 2058 2059
static int
virLXCControllerStartFuse(virLXCControllerPtr ctrl)
{
    return lxcStartFuse(ctrl->fuse);
}

2060 2061 2062 2063 2064
static int
virLXCControllerSetupConsoles(virLXCControllerPtr ctrl,
                              char **containerTTYPaths)
{
    size_t i;
2065 2066
    int ret = -1;
    char *ttyHostPath = NULL;
2067

2068
    for (i = 0; i < ctrl->nconsoles; i++) {
2069
        VIR_DEBUG("Opening tty on private %s", ctrl->devptmx);
2070
        if (lxcCreateTty(ctrl,
2071
                         &ctrl->consoles[i].contFd,
2072
                         &containerTTYPaths[i], &ttyHostPath) < 0) {
2073
            virReportSystemError(errno, "%s",
2074
                                     _("Failed to allocate tty"));
2075
            goto cleanup;
2076
        }
2077 2078

        /* Change the owner of tty device to the root user of container */
2079
        if (lxcContainerChown(ctrl->def, ttyHostPath) < 0)
2080 2081 2082
            goto cleanup;

        VIR_FREE(ttyHostPath);
2083
    }
2084 2085

    ret = 0;
2086
 cleanup:
2087 2088
    VIR_FREE(ttyHostPath);
    return ret;
2089 2090 2091
}


2092 2093 2094 2095 2096 2097 2098 2099
static void
virLXCControllerEventSend(virLXCControllerPtr ctrl,
                          int procnr,
                          xdrproc_t proc,
                          void *data)
{
    virNetMessagePtr msg;

2100
    if (!ctrl->client) {
2101
        VIR_WARN("Dropping event %d because libvirtd is not connected", procnr);
2102
        return;
2103
    }
2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127

    VIR_DEBUG("Send event %d client=%p", procnr, ctrl->client);
    if (!(msg = virNetMessageNew(false)))
        goto error;

    msg->header.prog = virNetServerProgramGetID(ctrl->prog);
    msg->header.vers = virNetServerProgramGetVersion(ctrl->prog);
    msg->header.proc = procnr;
    msg->header.type = VIR_NET_MESSAGE;
    msg->header.serial = 1;
    msg->header.status = VIR_NET_OK;

    if (virNetMessageEncodeHeader(msg) < 0)
        goto error;

    if (virNetMessageEncodePayload(msg, proc, data) < 0)
        goto error;

    VIR_DEBUG("Queue event %d %zu", procnr, msg->bufferLength);
    virNetServerClientSendMessage(ctrl->client, msg);

    xdr_free(proc, data);
    return;

2128
 error:
2129 2130 2131 2132 2133 2134 2135 2136 2137
    virNetMessageFree(msg);
    xdr_free(proc, data);
}


static int
virLXCControllerEventSendExit(virLXCControllerPtr ctrl,
                              int exitstatus)
{
2138
    virLXCMonitorExitEventMsg msg;
2139

2140
    VIR_DEBUG("Exit status %d (client=%p)", exitstatus, ctrl->client);
2141 2142 2143
    memset(&msg, 0, sizeof(msg));
    switch (exitstatus) {
    case 0:
2144
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_SHUTDOWN;
2145
        break;
2146
    case 1:
2147
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_REBOOT;
2148
        break;
2149
    default:
2150
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_ERROR;
2151 2152 2153 2154
        break;
    }

    virLXCControllerEventSend(ctrl,
2155 2156
                              VIR_LXC_MONITOR_PROC_EXIT_EVENT,
                              (xdrproc_t)xdr_virLXCMonitorExitEventMsg,
2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169
                              (void*)&msg);

    if (ctrl->client) {
        VIR_DEBUG("Waiting for client to complete dispatch");
        ctrl->inShutdown = true;
        virNetServerClientDelayedClose(ctrl->client);
        virNetServerRun(ctrl->server);
    }
    VIR_DEBUG("Client has gone away");
    return 0;
}


2170 2171 2172 2173
static int
virLXCControllerEventSendInit(virLXCControllerPtr ctrl,
                              pid_t initpid)
{
2174
    virLXCMonitorInitEventMsg msg;
2175 2176 2177 2178 2179 2180

    VIR_DEBUG("Init pid %llu", (unsigned long long)initpid);
    memset(&msg, 0, sizeof(msg));
    msg.initpid = initpid;

    virLXCControllerEventSend(ctrl,
2181 2182
                              VIR_LXC_MONITOR_PROC_INIT_EVENT,
                              (xdrproc_t)xdr_virLXCMonitorInitEventMsg,
2183 2184 2185 2186 2187
                              (void*)&msg);
    return 0;
}


2188
static int
2189
virLXCControllerRun(virLXCControllerPtr ctrl)
2190 2191 2192 2193 2194 2195 2196
{
    int rc = -1;
    int control[2] = { -1, -1};
    int containerhandshake[2] = { -1, -1 };
    char **containerTTYPaths = NULL;
    size_t i;

2197
    if (VIR_ALLOC_N(containerTTYPaths, ctrl->nconsoles) < 0)
2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211
        goto cleanup;

    if (socketpair(PF_UNIX, SOCK_STREAM, 0, control) < 0) {
        virReportSystemError(errno, "%s",
                             _("sockpair failed"));
        goto cleanup;
    }

    if (socketpair(PF_UNIX, SOCK_STREAM, 0, containerhandshake) < 0) {
        virReportSystemError(errno, "%s",
                             _("socketpair failed"));
        goto cleanup;
    }

2212 2213 2214
    if (virLXCControllerSetupPrivateNS() < 0)
        goto cleanup;

2215 2216 2217
    if (virLXCControllerSetupLoopDevices(ctrl) < 0)
        goto cleanup;

2218
    if (virLXCControllerSetupResourceLimits(ctrl) < 0)
2219 2220 2221 2222 2223
        goto cleanup;

    if (virLXCControllerSetupDevPTS(ctrl) < 0)
        goto cleanup;

2224 2225 2226
    if (virLXCControllerPopulateDevices(ctrl) < 0)
        goto cleanup;

2227 2228 2229
    if (virLXCControllerSetupAllDisks(ctrl) < 0)
        goto cleanup;

2230 2231 2232
    if (virLXCControllerSetupAllHostdevs(ctrl) < 0)
        goto cleanup;

G
Gao feng 已提交
2233 2234 2235
    if (virLXCControllerSetupFuse(ctrl) < 0)
        goto cleanup;

2236 2237
    if (virLXCControllerSetupConsoles(ctrl, containerTTYPaths) < 0)
        goto cleanup;
2238

2239
    if (lxcSetPersonality(ctrl->def) < 0)
2240
        goto cleanup;
2241

2242
    if ((ctrl->initpid = lxcContainerStart(ctrl->def,
2243
                                           ctrl->securityManager,
2244 2245
                                           ctrl->nveths,
                                           ctrl->veths,
2246 2247
                                           ctrl->npassFDs,
                                           ctrl->passFDs,
2248 2249
                                           control[1],
                                           containerhandshake[1],
2250 2251
                                           ctrl->nconsoles,
                                           containerTTYPaths)) < 0)
2252
        goto cleanup;
2253
    VIR_FORCE_CLOSE(control[1]);
2254
    VIR_FORCE_CLOSE(containerhandshake[1]);
2255

2256 2257 2258
    for (i = 0; i < ctrl->npassFDs; i++)
        VIR_FORCE_CLOSE(ctrl->passFDs[i]);

2259 2260 2261
    if (virLXCControllerSetupCgroupLimits(ctrl) < 0)
        goto cleanup;

2262 2263 2264
    if (virLXCControllerSetupUserns(ctrl) < 0)
        goto cleanup;

2265
    if (virLXCControllerMoveInterfaces(ctrl) < 0)
2266 2267
        goto cleanup;

2268 2269 2270
    if (virLXCControllerStartFuse(ctrl) < 0)
        goto cleanup;

2271 2272 2273
    if (lxcContainerSendContinue(control[0]) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to send container continue message"));
2274
        goto cleanup;
2275
    }
2276

2277 2278 2279 2280 2281 2282
    if (lxcContainerWaitForContinue(containerhandshake[0]) < 0) {
        virReportSystemError(errno, "%s",
                             _("error receiving signal from container"));
        goto cleanup;
    }

2283
    /* ...and reduce our privileges */
D
Daniel P. Berrange 已提交
2284 2285 2286
    if (lxcControllerClearCapabilities() < 0)
        goto cleanup;

2287
    if (virLXCControllerDaemonHandshake(ctrl) < 0)
2288 2289
        goto cleanup;

2290
    for (i = 0; i < ctrl->nconsoles; i++)
2291
        if (virLXCControllerConsoleSetNonblocking(&(ctrl->consoles[i])) < 0)
2292
            goto cleanup;
2293

2294 2295 2296 2297 2298 2299
    /* We must not hold open a dbus connection for life
     * of LXC instance, since dbus-daemon is limited to
     * only a few 100 connections by default
     */
    virDBusCloseSystemBus();

2300
    rc = virLXCControllerMain(ctrl);
2301

2302 2303
    virLXCControllerEventSendExit(ctrl, rc);

2304
 cleanup:
2305 2306
    VIR_FORCE_CLOSE(control[0]);
    VIR_FORCE_CLOSE(control[1]);
2307 2308
    VIR_FORCE_CLOSE(containerhandshake[0]);
    VIR_FORCE_CLOSE(containerhandshake[1]);
2309

2310
    for (i = 0; i < ctrl->nconsoles; i++)
2311 2312
        VIR_FREE(containerTTYPaths[i]);
    VIR_FREE(containerTTYPaths);
2313

2314
    virLXCControllerStopInit(ctrl);
2315

2316 2317 2318 2319
    return rc;
}


2320
int main(int argc, char *argv[])
2321 2322
{
    pid_t pid;
2323
    int rc = -1;
2324
    const char *name = NULL;
2325
    size_t nveths = 0;
2326
    char **veths = NULL;
2327
    int handshakeFd = -1;
2328
    bool bg = false;
2329
    const struct option options[] = {
2330 2331 2332 2333
        { "background", 0, NULL, 'b' },
        { "name",   1, NULL, 'n' },
        { "veth",   1, NULL, 'v' },
        { "console", 1, NULL, 'c' },
2334
        { "passfd", 1, NULL, 'p' },
2335
        { "handshakefd", 1, NULL, 's' },
2336
        { "security", 1, NULL, 'S' },
2337 2338 2339
        { "help", 0, NULL, 'h' },
        { 0, 0, 0, 0 },
    };
2340 2341
    int *ttyFDs = NULL;
    size_t nttyFDs = 0;
2342 2343
    int *passFDs = NULL;
    size_t npassFDs = 0;
2344
    virLXCControllerPtr ctrl = NULL;
2345
    size_t i;
2346
    const char *securityDriver = "none";
2347

E
Eric Blake 已提交
2348 2349
    if (setlocale(LC_ALL, "") == NULL ||
        bindtextdomain(PACKAGE, LOCALEDIR) == NULL ||
2350 2351 2352
        textdomain(PACKAGE) == NULL ||
        virThreadInitialize() < 0 ||
        virErrorInitialize() < 0) {
E
Eric Blake 已提交
2353 2354 2355 2356
        fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
        exit(EXIT_FAILURE);
    }

2357 2358 2359
    /* Initialize logging */
    virLogSetFromEnv();

2360 2361
    while (1) {
        int c;
2362

2363
        c = getopt_long(argc, argv, "dn:v:p:m:c:s:h:S:",
2364 2365 2366 2367 2368 2369 2370
                       options, NULL);

        if (c == -1)
            break;

        switch (c) {
        case 'b':
2371
            bg = true;
2372 2373 2374
            break;

        case 'n':
2375
            name = optarg;
2376 2377 2378
            break;

        case 'v':
2379
            if (VIR_REALLOC_N(veths, nveths+1) < 0)
2380
                goto cleanup;
2381
            if (VIR_STRDUP(veths[nveths++], optarg) < 0)
2382 2383 2384 2385
                goto cleanup;
            break;

        case 'c':
2386
            if (VIR_REALLOC_N(ttyFDs, nttyFDs + 1) < 0)
2387 2388
                goto cleanup;
            if (virStrToLong_i(optarg, NULL, 10, &ttyFDs[nttyFDs++]) < 0) {
2389 2390 2391 2392 2393
                fprintf(stderr, "malformed --console argument '%s'", optarg);
                goto cleanup;
            }
            break;

2394 2395 2396 2397 2398 2399 2400 2401 2402
        case 'p':
            if (VIR_REALLOC_N(passFDs, npassFDs + 1) < 0)
                goto cleanup;
            if (virStrToLong_i(optarg, NULL, 10, &passFDs[npassFDs++]) < 0) {
                fprintf(stderr, "malformed --passfd argument '%s'", optarg);
                goto cleanup;
            }
            break;

2403
        case 's':
2404
            if (virStrToLong_i(optarg, NULL, 10, &handshakeFd) < 0) {
2405 2406 2407 2408 2409 2410
                fprintf(stderr, "malformed --handshakefd argument '%s'",
                        optarg);
                goto cleanup;
            }
            break;

2411
        case 'S':
2412
            securityDriver = optarg;
2413 2414
            break;

2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425
        case 'h':
        case '?':
            fprintf(stderr, "\n");
            fprintf(stderr, "syntax: %s [OPTIONS]\n", argv[0]);
            fprintf(stderr, "\n");
            fprintf(stderr, "Options\n");
            fprintf(stderr, "\n");
            fprintf(stderr, "  -b, --background\n");
            fprintf(stderr, "  -n NAME, --name NAME\n");
            fprintf(stderr, "  -c FD, --console FD\n");
            fprintf(stderr, "  -v VETH, --veth VETH\n");
2426
            fprintf(stderr, "  -s FD, --handshakefd FD\n");
2427
            fprintf(stderr, "  -S NAME, --security NAME\n");
2428 2429 2430
            fprintf(stderr, "  -h, --help\n");
            fprintf(stderr, "\n");
            goto cleanup;
2431 2432 2433
        }
    }

2434 2435 2436 2437 2438
    if (name == NULL) {
        fprintf(stderr, "%s: missing --name argument for configuration\n", argv[0]);
        goto cleanup;
    }

2439
    if (handshakeFd < 0) {
2440
        fprintf(stderr, "%s: missing --handshakefd argument for container PTY\n",
2441 2442 2443 2444
                argv[0]);
        goto cleanup;
    }

2445
    if (geteuid() != 0) {
2446 2447 2448
        fprintf(stderr, "%s: must be run as the 'root' user\n", argv[0]);
        goto cleanup;
    }
2449

2450
    virEventRegisterDefaultImpl();
2451 2452

    virDBusSetSharedBus(false);
2453

2454
    if (!(ctrl = virLXCControllerNew(name)))
2455
        goto cleanup;
2456

2457 2458
    ctrl->handshakeFd = handshakeFd;

2459 2460 2461 2462 2463
    if (!(ctrl->securityManager = virSecurityManagerNew(securityDriver,
                                                        LXC_DRIVER_NAME,
                                                        false, false, false)))
        goto cleanup;

2464 2465 2466 2467 2468 2469 2470 2471 2472
    if (ctrl->def->seclabels) {
        VIR_DEBUG("Security model %s type %s label %s imagelabel %s",
                  NULLSTR(ctrl->def->seclabels[0]->model),
                  virDomainSeclabelTypeToString(ctrl->def->seclabels[0]->type),
                  NULLSTR(ctrl->def->seclabels[0]->label),
                  NULLSTR(ctrl->def->seclabels[0]->imagelabel));
    } else {
        VIR_DEBUG("Security model not initialized");
    }
2473

2474 2475 2476
    ctrl->veths = veths;
    ctrl->nveths = nveths;

2477 2478 2479
    ctrl->passFDs = passFDs;
    ctrl->npassFDs = npassFDs;

2480
    for (i = 0; i < nttyFDs; i++) {
2481 2482 2483 2484 2485
        if (virLXCControllerAddConsole(ctrl, ttyFDs[i]) < 0)
            goto cleanup;
        ttyFDs[i] = -1;
    }

2486
    if (virLXCControllerValidateNICs(ctrl) < 0)
2487
        goto cleanup;
2488

2489 2490 2491
    if (virLXCControllerValidateConsoles(ctrl) < 0)
        goto cleanup;

2492
    if (virLXCControllerSetupServer(ctrl) < 0)
2493
        goto cleanup;
2494

2495 2496 2497
    if (bg) {
        if ((pid = fork()) < 0)
            goto cleanup;
2498

2499
        if (pid > 0) {
2500
            if ((rc = virPidFileWrite(LXC_STATE_DIR, name, pid)) < 0) {
2501
                virReportSystemError(-rc,
2502 2503
                                     _("Unable to write pid file '%s/%s.pid'"),
                                     LXC_STATE_DIR, name);
2504 2505
                _exit(1);
            }
2506

2507 2508 2509 2510
            /* First child now exits, allowing original caller
             * (ie libvirtd's LXC driver to complete their
             * waitpid & continue */
            _exit(0);
2511 2512
        }

E
Eric Blake 已提交
2513
        /* Don't hold on to any cwd we inherit from libvirtd either */
2514
        if (chdir("/") < 0) {
2515
            virReportSystemError(errno, "%s",
2516
                                 _("Unable to change to root dir"));
2517 2518 2519 2520
            goto cleanup;
        }

        if (setsid() < 0) {
2521
            virReportSystemError(errno, "%s",
2522
                                 _("Unable to become session leader"));
2523 2524 2525
            goto cleanup;
        }
    }
2526

2527
    rc = virLXCControllerRun(ctrl);
2528

2529
 cleanup:
2530 2531 2532 2533 2534 2535 2536 2537 2538
    if (rc < 0) {
        virErrorPtr err = virGetLastError();
        if (err && err->message)
            fprintf(stderr, "%s\n", err->message);
        else
            fprintf(stderr, "%s\n",
                    _("Unknown failure in libvirt_lxc startup"));
    }

2539
    virPidFileDelete(LXC_STATE_DIR, name);
2540 2541
    if (ctrl)
        virLXCControllerDeleteInterfaces(ctrl);
2542
    for (i = 0; i < nttyFDs; i++)
2543 2544
        VIR_FORCE_CLOSE(ttyFDs[i]);
    VIR_FREE(ttyFDs);
2545 2546 2547
    for (i = 0; i < npassFDs; i++)
        VIR_FORCE_CLOSE(passFDs[i]);
    VIR_FREE(passFDs);
2548

2549
    virLXCControllerFree(ctrl);
2550

2551
    return rc < 0? EXIT_FAILURE : EXIT_SUCCESS;
2552
}